General

  • Target

    81be5885ba8ef998066cd36efe6884fea44408ad663ea62666d973f800f9e63e.exe

  • Size

    483KB

  • MD5

    3ecad91b6dd833ebc34731f8f07341fa

  • SHA1

    dcc36f7bf54db788bea8feb31c8b6705bf7bb3dd

  • SHA256

    81be5885ba8ef998066cd36efe6884fea44408ad663ea62666d973f800f9e63e

  • SHA512

    87e70824aafa1219897dc992244f36a0b29d4866ef9aa3e77d5ba3b320e3711d4e007d58b113e6cf8b0dea5b3f4b1919761f6b3d66ffdb3db8041779b85d9fb6

  • SSDEEP

    6144:QTz+c6KHYBhDc1RGJdv//NkUn+N5Bkf/0TELRvIZPjbsAOZZBAXccrbT4:QTlrYw1RUh3NFn+N5WfIQIjbs/ZB0T4

Score
10/10

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

ugnrv.duckdns.org:9674

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-0BYJUE

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 81be5885ba8ef998066cd36efe6884fea44408ad663ea62666d973f800f9e63e.exe
    .exe windows:5 windows x86 arch:x86

    1389569a3a39186f3eb453b501cfe688


    Headers

    Imports

    Sections